Secure image transmission in Wireless Sensor Network (WSN) applications /

Saved in:
Bibliographic Details
Author / Creator:Shankar, K., author.
Imprint:Cham : Springer, 2019.
Description:1 online resource
Language:English
Series:Lecture notes in electrical engineering ; 564
Lecture notes in electrical engineering ; v. 564.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11912687
Hidden Bibliographic Details
Other authors / contributors:Elhoseny, Mohamed, author.
ISBN:9783030208165
3030208168
303020815X
9783030208158
9783030208172
3030208176
9783030208189
3030208184
9783030208158
Digital file characteristics:text file PDF
Notes:Online resource; title from PDF title page (EBSCO, viewed June 13, 2019)
Summary:This book offers an essential guide to Wireless Sensor Networks, IoT Security, Image Processing, Secure Information Systems, and Data Encryption. In addition, it introduces students and aspiring practitioners to the subject of destination marketing in a structured manner. It is chiefly intended for researcher students in the areas of Wireless Sensor Networks and Secure Data Communication (including image encryption, and intrusion detection systems), academics at universities and colleges, IT professionals, policymakers and legislators. Given its content, the book can be used as a reference text for both undergraduate and graduate studies, in courses on Wireless Sensor Networks, Secure Image Processing, and Data Encryption applications. The book is written in plain and easy-to-follow language and explains each main concept the first time it appears, helping readers with no prior background in the field. As such, it is a "must-read" guide to the subject matter.
Other form:Printed edition: 9783030208158
Printed edition: 9783030208172
Printed edition: 9783030208189
Standard no.:10.1007/978-3-030-20816-5

MARC

LEADER 00000cam a2200000Ii 4500
001 11912687
006 m o d
007 cr cnu---unuuu
008 190613s2019 sz o 000 0 eng d
005 20240717165528.9
015 |a GBB9B1808  |2 bnb 
016 7 |a 019437568  |2 Uk 
019 |a 1110861605  |a 1115079370  |a 1126146890  |a 1156341099  |a 1162718233 
020 |a 9783030208165  |q (electronic bk.) 
020 |a 3030208168  |q (electronic bk.) 
020 |a 303020815X 
020 |a 9783030208158 
020 |a 9783030208172  |q (print) 
020 |a 3030208176 
020 |a 9783030208189  |q (print) 
020 |a 3030208184 
020 |z 9783030208158 
024 7 |a 10.1007/978-3-030-20816-5  |2 doi 
035 |a (OCoLC)1104346067  |z (OCoLC)1110861605  |z (OCoLC)1115079370  |z (OCoLC)1126146890  |z (OCoLC)1156341099  |z (OCoLC)1162718233 
035 9 |a (OCLCCM-CC)1104346067 
037 |a com.springer.onix.9783030208165  |b Springer Nature 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d EBLCP  |d LQU  |d GW5XE  |d OCLCF  |d UKMGB  |d DCT  |d VT2  |d OCLCQ  |d UKAHL 
049 |a MAIN 
050 4 |a TK5105.2 
072 7 |a TEC  |x 009070  |2 bisacsh 
072 7 |a TJKW  |2 bicssc 
072 7 |a TJKW  |2 thema 
100 1 |a Shankar, K.,  |e author.  |0 http://id.loc.gov/authorities/names/n2007201059 
245 1 0 |a Secure image transmission in Wireless Sensor Network (WSN) applications /  |c K. Shankar and Mohamed Elhoseny. 
264 1 |a Cham :  |b Springer,  |c 2019. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture notes in electrical engineering ;  |v 564 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed June 13, 2019) 
505 0 |a Introduction -- An Optimal Light Weight Cryptography -- SIMON Block Cipher for Secure Image Transmission in Wireless Sensor Networks -- An Optimal Lightweight RECTANGLE Block Cipher for Secure Image Transmission in Wireless Sensor Networks -- An Optimal Lightweight Cryptographic Hash Function for Secure Image Transmission in Wireless Sensor Networks -- An Optimal Haar Wavelet with Light Weight Cryptography based Secret Data Hiding on Digital Images in Wireless Sensor Networks. 
520 |a This book offers an essential guide to Wireless Sensor Networks, IoT Security, Image Processing, Secure Information Systems, and Data Encryption. In addition, it introduces students and aspiring practitioners to the subject of destination marketing in a structured manner. It is chiefly intended for researcher students in the areas of Wireless Sensor Networks and Secure Data Communication (including image encryption, and intrusion detection systems), academics at universities and colleges, IT professionals, policymakers and legislators. Given its content, the book can be used as a reference text for both undergraduate and graduate studies, in courses on Wireless Sensor Networks, Secure Image Processing, and Data Encryption applications. The book is written in plain and easy-to-follow language and explains each main concept the first time it appears, helping readers with no prior background in the field. As such, it is a "must-read" guide to the subject matter. 
650 0 |a Image transmission.  |0 http://id.loc.gov/authorities/subjects/sh85064450 
650 0 |a Imaging systems.  |0 http://id.loc.gov/authorities/subjects/sh85064471 
650 0 |a Wireless LANs  |x Security measures. 
650 7 |a TECHNOLOGY & ENGINEERING  |x Mechanical.  |2 bisacsh 
650 7 |a Image transmission.  |2 fast  |0 (OCoLC)fst00967536 
650 7 |a Imaging systems.  |2 fast  |0 (OCoLC)fst00967605 
650 7 |a Wireless LANs  |x Security measures.  |2 fast  |0 (OCoLC)fst01176207 
655 4 |a Electronic books. 
700 1 |a Elhoseny, Mohamed,  |e author.  |0 http://id.loc.gov/authorities/names/no2019014896 
776 0 8 |i Printed edition:  |z 9783030208158 
776 0 8 |i Printed edition:  |z 9783030208172 
776 0 8 |i Printed edition:  |z 9783030208189 
830 0 |a Lecture notes in electrical engineering ;  |v v. 564.  |0 http://id.loc.gov/authorities/names/no2007099709 
903 |a HeVa 
929 |a oclccm 
999 f f |i fdba0a64-3bca-5446-a941-7b884c403dc6  |s 3c75d698-11b3-558c-82b9-8228c4b8e55b 
928 |t Library of Congress classification  |a TK5105.2  |l Online  |c UC-FullText  |u https://link.springer.com/10.1007/978-3-030-20816-5  |z Springer Nature  |g ebooks  |i 12561452